Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2014.0034
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2014-0034)
Zusammenfassung:The remote host is missing an update for the 'pidgin' package(s) announced via the MGASA-2014-0034 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'pidgin' package(s) announced via the MGASA-2014-0034 advisory.

Vulnerability Insight:
Many places in the Yahoo! protocol plugin assumed incoming strings were
UTF-8 and failed to transcode from non-UTF-8 encodings. This can lead to a
crash when receiving strings that aren't UTF-8 (CVE-2012-6152).

A remote XMPP user can trigger a crash on some systems by sending a
message with a timestamp in the distant future (CVE-2013-6477).

libX11 forcefully exits causing a crash when Pidgin tries to create an
exceptionally wide tooltip window when hovering the pointer over a long
URL (CVE-2013-6478).

A malicious server or man-in-the-middle could send a malformed HTTP
response that could lead to a crash (CVE-2013-6479).

The Yahoo! protocol plugin failed to validate a length field before trying
to read from a buffer, which could result in reading past the end of the
buffer which could cause a crash when reading a P2P message
(CVE-2013-6481).

NULL pointer dereferences in the MSN protocol plugin due to a malformed
Content-Length header, or a malicious server or man-in-the-middle sending
a specially crafted OIM data XML response or SOAP response
(CVE-2013-6482).

The XMPP protocol plugin failed to ensure that iq replies came from the
person they were sent to. A remote user could send a spoofed iq reply and
attempt to guess the iq id. This could allow an attacker to inject fake
data or trigger a null pointer dereference (CVE-2013-6483).

Incorrect error handling when reading the response from a STUN server
could lead to a crash (CVE-2013-6484).

A malicious server or man-in-the-middle could cause a buffer overflow by
sending a malformed HTTP response with chunked Transfer-Encoding with
invalid chunk sizes (CVE-2013-6485).

A malicious server or man-in-the-middle could send a large value for
Content-Length and cause an integer overflow which could lead to a buffer
overflow in Gadu-Gadu HTTP parsing (CVE-2013-6487).

A specially crafted emoticon value could cause an integer overflow which
could lead to a buffer overflow in MXit emoticon parsing (CVE-2013-6489).

A Content-Length of -1 could lead to a buffer overflow in SIMPLE header
parsing (CVE-2013-6490).

A malicious server or man-in-the-middle could trigger a crash in IRC
argument parsing in libpurple by sending a message with fewer than
expected arguments
(CVE-2014-0020).

Affected Software/OS:
'pidgin' package(s) on Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-6152
RedHat Security Advisories: RHSA-2014:0139
https://rhn.redhat.com/errata/RHSA-2014-0139.html
SuSE Security Announcement: openSUSE-SU-2014:0239 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00039.html
SuSE Security Announcement: openSUSE-SU-2014:0326 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-03/msg00005.html
http://www.ubuntu.com/usn/USN-2100-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-6477
Debian Security Information: DSA-2859 (Google Search)
http://www.debian.org/security/2014/dsa-2859
Common Vulnerability Exposure (CVE) ID: CVE-2013-6478
http://pidgin.im/pipermail/support/2013-March/012980.html
http://pidgin.im/pipermail/support/2013-March/012981.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-6479
Common Vulnerability Exposure (CVE) ID: CVE-2013-6481
Common Vulnerability Exposure (CVE) ID: CVE-2013-6482
Common Vulnerability Exposure (CVE) ID: CVE-2013-6483
Common Vulnerability Exposure (CVE) ID: CVE-2013-6484
Common Vulnerability Exposure (CVE) ID: CVE-2013-6485
BugTraq ID: 65243
http://www.securityfocus.com/bid/65243
Common Vulnerability Exposure (CVE) ID: CVE-2013-6487
BugTraq ID: 65188
http://www.securityfocus.com/bid/65188
Debian Security Information: DSA-2852 (Google Search)
http://www.debian.org/security/2014/dsa-2852
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128277.html
https://security.gentoo.org/glsa/201508-02
http://www.mandriva.com/security/advisories?name=MDVSA-2014:039
http://libgadu.net/releases/1.11.3.html
http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
http://www.ubuntu.com/usn/USN-2101-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-6489
BugTraq ID: 65192
http://www.securityfocus.com/bid/65192
http://hg.pidgin.im/pidgin/main/rev/4c897372b5a4
Common Vulnerability Exposure (CVE) ID: CVE-2013-6490
BugTraq ID: 65195
http://www.securityfocus.com/bid/65195
Common Vulnerability Exposure (CVE) ID: CVE-2014-0020
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.